{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:46:43Z","timestamp":1773193603807,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Intel"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620665.3640404","type":"proceedings-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T14:18:06Z","timestamp":1713795486000},"page":"1014-1028","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Rubix: Reducing the Overhead of Secure Rowhammer Mitigations via Randomized Line-to-Row Mapping"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8925-8109","authenticated-orcid":false,"given":"Anish","family":"Saxena","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0496-2513","authenticated-orcid":false,"given":"Saurav","family":"Mathur","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1314-9096","authenticated-orcid":false,"given":"Moinuddin","family":"Qureshi","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"SPEC CPU2017 Benchmark Suite. In Standard Performance Evaluation Corporation. http:\/\/www.spec.org\/cpu2017\/","unstructured":"[n. d.]. SPEC CPU2017 Benchmark Suite. In Standard Performance Evaluation Corporation. http:\/\/www.spec.org\/cpu2017\/"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. \"Half-Double\": Next-Row-Over Assisted RowHammer."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2954679.2872390"},{"key":"e_1_3_2_1_4_1","volume-title":"Panopticon: A Complete In-DRAM Rowhammer Mitigation. In Workshop on DRAM Security (DRAMSec).","author":"Bennett Tanj","year":"2021","unstructured":"Tanj Bennett, Stefan Saroiu, Alec Wolman, and Lucian Cojocar. 2021. Panopticon: A Complete In-DRAM Rowhammer Mitigation. In Workshop on DRAM Security (DRAMSec)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00085"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00089"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"e_1_3_2_1_10_1","unstructured":"Martin Heckel and Florian Adamsky. 2023. Reverse-Engineering Bank Addressing Functions on AMD CPUs. (2023)."},{"key":"e_1_3_2_1_11_1","volume-title":"DSAC: Low-Cost Rowhammer Mitigation Using In-DRAM Stochastic and Approximate Counting Algorithm. arXiv:2302.03591 [cs.CR]","author":"Hong Seungki","year":"2023","unstructured":"Seungki Hong, Dongha Kim, Jaehyung Lee, Reum Oh, Changsik Yoo, Sangjoon Hwang, and Jooyoung Lee. 2023. DSAC: Low-Cost Rowhammer Mitigation Using In-DRAM Stochastic and Approximate Counting Algorithm. arXiv:2302.03591 [cs.CR]"},{"key":"e_1_3_2_1_12_1","unstructured":"Micron Technology Inc. 2015. DDR4 SDRAM Datasheet (MT40A2G4). (2015). https:\/\/www.micron.com\/-\/media\/client\/global\/documents\/products\/data-sheet\/dram\/ddr4\/8gb_ddr4_sdram.pdf"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152709"},{"key":"e_1_3_2_1_14_1","volume-title":"BLACKSMITH: Rowhammering in the Frequency Domain. In 43rd IEEE Symposium on Security and Privacy'22 (Oakland). https:\/\/comsec.ethz.ch\/wp-content\/files\/blacksmith_sp22","author":"Jattke Patrick","unstructured":"Patrick Jattke, Victor van der Veen, Pietro Frigo, Stijn Gunter, and Kaveh Razavi. 2022. BLACKSMITH: Rowhammering in the Frequency Domain. In 43rd IEEE Symposium on Security and Privacy'22 (Oakland). https:\/\/comsec.ethz.ch\/wp-content\/files\/blacksmith_sp22.pdf."},{"key":"e_1_3_2_1_15_1","unstructured":"JEDEC. 2021. Near-Term DRAM Level Rowhammer Mitigation (JEP300-1). (2021)."},{"key":"e_1_3_2_1_16_1","unstructured":"JEDEC. 2021. System Level Rowhammer Mitigation (JEP301-1). (2021)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.1557716"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155624"},{"key":"e_1_3_2_1_19_1","volume-title":"Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques. In 2020 ACM\/IEEE 47th ISCA","author":"Kim Jeremie S","unstructured":"Jeremie S Kim, Minesh Patel, A Giray Ya\u011fl\u0131k\u00e7\u0131, Hasan Hassan, Roknoddin Azizi, Lois Orosa, and Onur Mutlu. 2020. Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques. In 2020 ACM\/IEEE 47th ISCA. IEEE, 638--651."},{"key":"e_1_3_2_1_20_1","volume-title":"Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques","author":"Kim Jeremie S","unstructured":"Jeremie S Kim, Minesh Patel, A Giray Ya\u011fl\u0131k\u00e7\u0131, Hasan Hassan, Roknoddin Azizi, Lois Orosa, and Onur Mutlu. 2020. Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques. In ISCA. IEEE, 638--651."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2907248"},{"key":"e_1_3_2_1_22_1","volume-title":"Jae W Lee, and Jung Ho Ahn.","author":"Kim Michael Jaemin","year":"2021","unstructured":"Michael Jaemin Kim, Jaehyun Park, Yeonhong Park, Wanju Doh, Namhoon Kim, Tae Jun Ham, Jae W Lee, and Jung Ho Ahn. 2021. Mithril: Cooperative Row Hammer Protection on Commodity DRAM Leveraging Managed Refresh. arXiv preprint arXiv:2108.06703 (2021)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Woongrae Kim Chulmoon Jung Seongnyuh Yoo Duckhwa Hong Jeongjin Hwang Jungmin Yoon Ohyong Jung Joonwoo Choi Sanga Hyun Mankeun Kang Sangho Lee Dohong Kim Sanghyun Ku Donhyun Choi Nogeun Joo Sangwoo Yoon Junseok Noh Byeongyong Go Cheolhoe Kim Sunil Hwang Mihyun Hwang Seol-Min Yi Hyungmin Kim Sanghyuk Heo Yeonsu Jang Kyoungchul Jang Shinho Chu Yoonna Oh Kwidong Kim Junghyun Kim Soohwan Kim Jeongtae Hwang Sangil Park Junphyo Lee Inchul Jeong Joohwan Cho and Jonghwan Kim. 2023. A 1.1V 16Gb DDR5 DRAM with Probabilistic-Aggressor Tracking Refresh-Management Functionality Per-Row Hammer Tracking a Multi-Step Precharge and Core-Bias Modulation for Security and Reliability Enhancement. In 2023 IEEE International Solid- State Circuits Conference (ISSCC). 1--3. 10.1109\/ISSCC42615.2023.10067805","DOI":"10.1109\/ISSCC42615.2023.10067805"},{"key":"e_1_3_2_1_24_1","volume-title":"Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu.","author":"Kim Yoongu","year":"2014","unstructured":"Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. 2014. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. ISCA (2014)."},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium.","author":"Kogler Andreas","year":"2022","unstructured":"Andreas Kogler, Jonas Juffinger, Salman Qazi, Yoongu Kim, Moritz Lipp, Nicolas Boichat, Eric Shiu, Mattias Nissler, and Daniel Gruss. 2022. Half-Double: Hammering from the next row over. In USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219582"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"e_1_3_2_1_28_1","volume-title":"BLASTER: Characterizing the Blast Radius of Rowhammer. In 3rd Workshop on DRAM Security (DRAMSec) co-located with ISCA","author":"Lang Zhenrong","year":"2023","unstructured":"Zhenrong Lang, Patrick Jattke, Michele Marazzi, and Kaveh Razavi. 2023. BLASTER: Characterizing the Blast Radius of Rowhammer. In 3rd Workshop on DRAM Security (DRAMSec) co-located with ISCA 2023. ETH Zurich."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Eojin Lee Ingab Kang Sukhan Lee G Edward Suh and Jung Ho Ahn. 2019. TWiCe: preventing row-hammering by exploiting time window counters. In ISCA.","DOI":"10.1145\/3307650.3322232"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.85"},{"key":"e_1_3_2_1_31_1","unstructured":"Jason Lowe-Power Abdul Mutaal Ahmad Ayaz Akram Mohammad Alian Rico Amslinger Matteo Andreozzi Adri\u00e0 Armejach Nils Asmussen Srikant Bharadwaj Gabe Black Gedare Bloom Bobby R. Bruce Daniel Rodrigues Carvalho Jer\u00f3nimo Castrill\u00f3n Lizhong Chen Nicolas Derumigny Stephan Diestelhorst Wendy Elsasser Marjan Fariborz Amin Farmahini Farahani Pouya Fotouhi Ryan Gambord Jayneel Gandhi Dibakar Gope Thomas Grass Bagus Hanindhito Andreas Hansson Swapnil Haria Austin Harris Timothy Hayes Adrian Herrera Matthew Horsnell Syed Ali Raza Jafri Radhika Jagtap Hanhwi Jang Reiley Jeyapaul Timothy M. Jones Matthias Jung Subash Kannoth Hamidreza Khaleghzadeh Yuetsu Kodama Tushar Krishna Tommaso Marinelli Christian Menard Andrea Mondelli Tiago M\u00fcck Omar Naji Krishnendra Nathella Hoa Nguyen Nikos Nikoleris Lena E. Olson Marc S. Orr Binh Pham Pablo Prieto Trivikram Reddy Alec Roelke Mahyar Samani Andreas Sandberg Javier Setoain Boris Shingarov Matthew D. Sinclair Tuan Ta Rahul Thakur Giacomo Travaglini Michael Upton Nilay Vaish Ilias Vougioukas Zhengrong Wang Norbert Wehn Christian Weis David A. Wood Hongil Yoon and \u00c9der F. Zulian. 2020. The gem5 simulator: Version 20.0+. arXiv preprint arXiv:2007.03152 (2020)."},{"key":"e_1_3_2_1_32_1","volume-title":"REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations. In 44rd IEEE Symposium on Security and Privacy (SP","author":"Marazzi Michele","year":"2023","unstructured":"Michele Marazzi, Flavien Solt, Patrick Jattke, Kubo Takashi, and Kaveh Razavi. 2023. REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations. In 44rd IEEE Symposium on Security and Privacy (SP 2023). IEEE."},{"key":"e_1_3_2_1_33_1","volume-title":"Memory Bandwidth and Machine Balance in Current High Performance Computers","author":"McCalpin John D.","year":"1995","unstructured":"John D. McCalpin. 1995. Memory Bandwidth and Machine Balance in Current High Performance Computers. IEEE Computer Society Technical Committee on Computer Architecture (TCCA) Newsletter (1995)."},{"key":"e_1_3_2_1_34_1","unstructured":"Micron Technology Inc. [n. d.]. System Power Calculators. ([n. d.]). https:\/\/www.micron.com\/support\/tools-and-utilities\/power-calc."},{"key":"e_1_3_2_1_35_1","volume-title":"Jung Ho Ahn, and Jae W Lee.","author":"Park Yeonhong","year":"2020","unstructured":"Yeonhong Park, Woosuk Kwon, Eojin Lee, Tae Jun Ham, Jung Ho Ahn, and Jae W Lee. 2020. Graphene: Strong yet Lightweight Row Hammer Protection. In MICRO. IEEE, 1--13."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00014"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527421"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00068"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322246"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669117"},{"key":"e_1_3_2_1_41_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Saileshwar Gururaj","year":"2021","unstructured":"Gururaj Saileshwar and Moinuddin Qureshi. 2021. MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design. In 30th USENIX Security Symposium (USENIX Security 21). 1379--1396."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507716"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00022"},{"key":"e_1_3_2_1_44_1","first-page":"71","article-title":"Exploiting the DRAM rowhammer bug to gain kernel privileges","volume":"15","author":"Seaborn Mark","year":"2015","unstructured":"Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. Black Hat 15 (2015), 71.","journal-title":"Black Hat"},{"key":"e_1_3_2_1_45_1","volume-title":"Dong Hyuk Woo, and Hsien-Hsin S Lee","author":"Seong Nak Hee","year":"2010","unstructured":"Nak Hee Seong, Dong Hyuk Woo, and Hsien-Hsin S Lee. 2010. Security refresh: Prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address mapping. ACM SIGARCH computer architecture news 38, 3 (2010), 383--394."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00057"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062281"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218599"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"e_1_3_2_1_51_1","volume-title":"USENIX Security Symposium. 675--692","author":"Werner Mario","year":"2019","unstructured":"Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, and Stefan Mangard. 2019. ScatterCache: Thwarting Cache Attacks via Cache Set Randomization.. In USENIX Security Symposium. 675--692."},{"key":"e_1_3_2_1_52_1","volume-title":"SHADOW: Preventing Row Hammer in DRAM with Intra-Subarray Row Shuffling. In 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA). 333--346","author":"Wi Minbok","year":"2023","unstructured":"Minbok Wi, Jaehyun Park, Seoyoung Ko, Michael Jaemin Kim, Nam Sung Kim, Eojin Lee, and Jung Ho Ahn. 2023. SHADOW: Preventing Row Hammer in DRAM with Intra-Subarray Row Shuffling. In 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA). 333--346."},{"key":"e_1_3_2_1_53_1","volume-title":"Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems. In 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA). IEEE, 374--389","author":"Woo Jeonghyun","year":"2023","unstructured":"Jeonghyun Woo, Gururaj Saileshwar, and Prashant J Nair. 2023. Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems. In 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA). IEEE, 374--389."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00037"},{"key":"e_1_3_2_1_55_1","volume-title":"23rd USENIX security symposium (USENIX security 14). 719--732.","author":"Yarom Yuval","unstructured":"Yuval Yarom and Katrina Falkner. 2014. {FLUSH+ RELOAD}: A high resolution, low noise, l3 cache {Side-Channel} attack. In 23rd USENIX security symposium (USENIX security 14). 719--732."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317866"}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640404","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:42Z","timestamp":1750291422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":56,"alternative-id":["10.1145\/3620665.3640404","10.1145\/3620665"],"URL":"https:\/\/doi.org\/10.1145\/3620665.3640404","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}